Thank Norberto and Dan Farrell!I think i had a misunderstand and made some mistakes.I hope I have correct it now.
/etc/conf.d/net in the server config_eth0=( "202.114.10.134 netmask 255.255.255.0 brd 202.114.10.255" ) routes_eth0=( "default gw 202.114.10.129" ) config_eth1=( "192.168.1.1 netmask 255.255.255.0 brd 192.168.1.255" ) /etc/conf.d/net in a PC config_eth0=( "192.168.1.35 netmask 255.255.255.0 brd 192.168.1.255" ) routes_eth0=( "default gw 192.168.1.1" ) 2007/5/15, Dan Farrell <[EMAIL PROTECTED]>:
Greetings all. Hope the weather in bejing is pleasant, Mr Wu. On Mon, 14 May 2007 11:58:34 -0300 (ART) "Norberto Bensa" <[EMAIL PROTECTED]> wrote: > On Mon, May 14, 2007 8:23 am, Chuanwen Wu wrote: > > Thank you!I think i have done what you meant. > > Here is the information: > > > > > > /etc/conf.d/net in the server > > config_eth0=( "202.114.10.134 netmask 255.255.255.0 brd > > 202.114.10.255" ) routes_eth0=( "default gw 202.114.10.129" ) > > OK > > > > config_eth1=( "192.168.1.63 netmask 255.255.255.0 brd > > 192.168.1.255" ) routes_eth1=( "default gw 192.168.1.1" ) > > You don't need a route here. More exactly, a route to the subnet 192.168.1.0/24 will automatically be created through eth1. A _gateway_ in this case is not necessary because eth1 lives on that subnet. > > > /etc/conf.d/net in one PC > > config_eth0=( "192.168.1.35 netmask 255.255.255.0 brd > > 192.168.1.255" ) routes_eth0=( "default gw 192.168.1.1" ) > > No. GW should be 192.168.1.63, which is the IP address of your > gateway. > HTH, > Norberto > First, the firewall configuration. Your first message said: > The eth0 here has the real ip,and the eth1 have a subnet > ip:192.168.1.21. But here you show that you set it to .63, as Norberto pointed out. I assume that was just a typographical error in the first email. Moving on, the default route for the firewall is probably to the outside world, and if you can ping google.com, it works. Second, the client configuration. The route for the subnet it's on (192.168.1/24) is automatically created, as before. The default route is the IP of the firewall/gateway it's behind, namely 192.168.1.63 as Norberto said. The machine that's forwarding packets to the internet for these hosts now provides the route to the outside world for these hosts. Third, you must tell your client PCs nameservers, so that they can resolve domain names. If you fail to do so, even though a ping of google.com, for example, fails, a ping of its ip address (64.233.167.99, in my case) will work.
All my PCs have the same /etc/resove.conf file with the server.And now the PC can't ping through 66.249.89.99(of course,the server can).
Fourth, you must check your firewall (that is, iptables) configuration to be sure your iptables all refer to the correct subnet. > iptables --table nat -A POSTROUTING -s 192.168.8.0/24 -j MASQUERADE that wasn't right -- obviously the subnet should be your own.
I have already corrected it to "iptables --table nat -A POSTROUTING -s 192.168.1.0/24 -j MASQUERADE" from the first time.
Since the firewall you're building knows all the information the hosts need to know (subnet information, routes, etc) you may wish to set up a rudimentary DHCP server on it, so that additional hosts can be added without configuration by the user. You may also wish to impliment a caching, recursive nameserver for enhanced efficiency. DNSMasq can do both.
Thanks for your advice!
-- [EMAIL PROTECTED] mailing list
When a PC ping 66.249.89.99,I got these information from the server: # tcpdump -n -i eth1 net 192.168.1.0/24 and port not 22 and not arp tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth1, link-type EN10MB (Ethernet), capture size 96 bytes 10:01:08.214160 IP 192.168.1.35 > 66.249.89.99: ICMP echo request, id 35391, seq 599, length 64 10:01:09.214014 IP 192.168.1.35 > 66.249.89.99: ICMP echo request, id 35391, seq 600, length 64 10:01:10.213899 IP 192.168.1.35 > 66.249.89.99: ICMP echo request, id 35391, seq 601, length 64 10:01:11.213792 IP 192.168.1.35 > 66.249.89.99: ICMP echo request, id 35391, seq 602, length 64 10:01:12.213676 IP 192.168.1.35 > 66.249.89.99: ICMP echo request, id 35391, seq 603, length 64 5 packets captured 5 packets received by filter 0 packets dropped by kernel And # tcpdump -n -i eth0 net 202.114.10.134 and port not 22 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes Does it mean that eth1(the interface in my subnet) receive the request but don't post forward it? -- wcw -- [EMAIL PROTECTED] mailing list

